Have you created a map of the to-be architecture?
You will need to review, and perhaps create, detailed network diagrams of the architecture as it will be implemented and may later need to examine the management console software and individual security devices. The creation of network documentation will foster an understanding of the security architecture and also ensure that any security incidents can be traced. Also, network documentation is essential in large networks where multiple parties may be engaged in an investigation. Network documentation should be detailed, including identification of all network security devices, access paths and business-critical segments.